Processing method and device as well as acquisition method and device for security information

A security information and processing method technology, applied in the field of security information processing method and device, acquisition method and device, can solve problems such as different security algorithms and keys, inability to achieve security isolation of different network slices, and inability to provide different network slices , to achieve security isolation and improve access security

Active Publication Date: 2017-08-25
DATANG MOBILE COMM EQUIP CO LTD
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide a security information processing method and device, and an acquisition method and device, which solves the problem that in the prior art, different

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method and device as well as acquisition method and device for security information
  • Processing method and device as well as acquisition method and device for security information
  • Processing method and device as well as acquisition method and device for security information

Examples

Experimental program
Comparison scheme
Effect test

Example

[0070] First embodiment

[0071] Such as figure 2 As shown, the first embodiment of the present invention provides a method for processing security information, and the processing method includes:

[0072] Step 101: The access control function entity generates security information;

[0073] Step 102: Send the security information to the control entity.

[0074] It should be noted that the access control function entity provided in the embodiment of the present invention may be AAA or HSS. Among them, AAA is Authentication Authorisation Accounting, authentication authorization accounting; HSS is Home Subscriber Server, home subscriber server

[0075] Such as image 3 Shown is the system architecture of a method for a terminal to access a network slice according to an embodiment of the present invention. The system architecture separates the authentication and authorization functions from each network slice to form an independent function, namely image 3 The access control function in ...

Example

[0107] Second embodiment

[0108] The second embodiment of the present invention provides a method for obtaining security information of a terminal, which is applied to network slicing, and the obtaining method includes:

[0109] Step 201: Receive terminal security information sent by the access control function entity; or,

[0110] Step 301: Send a first request message to the access control function entity, where the first request message carries the identification of the terminal requesting access to the network slice, and the first request message is used to request to obtain the security of the terminal. information;

[0111] Step 302: Receive security information of the terminal sent by the access control function; or,

[0112] Step 401: Receive an access request message of a terminal sent by an access device, where the access request message carries security information of the terminal.

[0113] Specifically, step 201 is that the access control entity actively provides the termin...

Example

[0117] The third embodiment

[0118] The third embodiment of the present invention provides a method for acquiring security information of network slicing, which is applied to a terminal and includes:

[0119] Step 501: Receive security information of each network slice subscribed by the terminal sent by the access control function entity; or,

[0120] Step 601: Send a second request message to an access control function entity, where the second request message carries information about the network slice accessed by the terminal, and the second request message is used to request to obtain the security of the network slice. information;

[0121] Step 602: Receive the security information of the network slice sent by the access control function entity.

[0122] Specifically, step 501 is actively provided for the access control function, which means that it sends to the terminal the security information of each network slice subscribed by the terminal during the authentication process (or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a processing method and device as well as acquisition method and device for security information. The processing method for the security information comprises the following steps: enabling an access control functional entity to generate security information; and sending the security information to a control entity. According to the embodiment of the invention, the access control functional entity authenticates and authorizes the terminal and is responsible for generating different security information for different network slices signed with the terminal, the network slices process high layer information sent by the terminal by using the generated security information to ensure that the terminal is accessed to the network slices, and thus the security isolation among the different network slices can be achieved, the access security can be improved, and the security isolation among the different network slices can be achieved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for processing security information, and an acquisition method and device. Background technique [0002] While supporting traditional mobile broadband (Mobile Broadband, MBB) scenarios, a mobile communication network also needs to support new scenarios. New scenarios have different requirements on the network, such as functions such as billing, policy control, security, and mobility. Mobile broadband scenarios may require application-dependent charging and policy control, while other scenarios may require simpler charging or policy. [0003] In order to better support different scenarios, services in different scenarios need to be isolated. With network slicing technology, a single physical network can be divided into multiple virtual networks. For example, a large number of electronic sensor failures cannot affect MBB users. Each network sl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/06H04W12/08
CPCH04L63/0876H04L63/0892H04L63/18H04L63/20H04W12/06H04W12/08
Inventor 侯云静徐晖艾明
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products